Karna to Privacy@lemmy.ml • 1 day agoTor says it’s "still safe" amid reports of police deanonymizing userswww.bleepingcomputer.commessage-square60fedilinkarrow-up1161arrow-down16cross-posted to: cybersecurity@sh.itjust.works
arrow-up1155arrow-down1external-linkTor says it’s "still safe" amid reports of police deanonymizing userswww.bleepingcomputer.comKarna to Privacy@lemmy.ml • 1 day agomessage-square60fedilinkcross-posted to: cybersecurity@sh.itjust.works
minus-square@Prunebutt@slrpnk.netlinkfedilink22•24 hours agoI wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.
minus-squarePossibly linuxlinkfedilinkEnglish2•9 hours agoWe use it but it doesn’t have the same protections or reliability as Tor
minus-squarePossibly linuxlinkfedilinkEnglish1•4 hours agoCheck the FAQ Also it lacks the more advanced features of Tor
minus-square@MigratingtoLemmy@lemmy.worldlinkfedilinkEnglish1•edit-24 hours agoPlease mention the “advanced features” it lacks compared to TOR. I have read the FAQ
minus-square@HelixDab2@lemm.eelinkfedilink1•12 hours agoI’ve tried to use it, but have not managed to get it to work. Which is a bummer. I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.
minus-square@Prunebutt@slrpnk.netlinkfedilink3•11 hours agoRemember that you need to let the server run for a bit, so it can establish , the routes. I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.
minus-square@ShortN0te@lemmy.mllinkfedilink9•23 hours agoAFAIK it only makes it harder not impossible.
minus-square@Prunebutt@slrpnk.netlinkfedilink1•17 hours agoAt least they can’t utili’e the applied tactic to host their own node.
What else you going to use?
I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.
We use it but it doesn’t have the same protections or reliability as Tor
Really? Care to explain?
Check the FAQ
Also it lacks the more advanced features of Tor
Please mention the “advanced features” it lacks compared to TOR. I have read the FAQ
I’ve tried to use it, but have not managed to get it to work. Which is a bummer.
I should probably try again now that I have a new computer. My old computer was so old that a lot of stuff wasn’t working correctly.
Remember that you need to let the server run for a bit, so it can establish , the routes.
I have a service constantly running on my server. When I want to browse, I tunnel the ports to my laptop.
Insane 2lown Posse?
https://en.m.wikipedia.org/wiki/I2P
AFAIK it only makes it harder not impossible.
At least they can’t utili’e the applied tactic to host their own node.